xml/web agent-a detected in Exchange Server 2016 CU 22

Sachin Shinde 1 Reputation point
2022-06-06T07:17:18.117+00:00

Hi,

We have Exchange Server 2016 CU 22 installed in our organisation. Sophos antivirus continuously detecting "xml/web agent-a" in 'inetpub/wwwroot' folder.

[PS] C:\Windows\system32>Get-Command Exsetup.exe | ForEach {$_.FileVersionInfo}

ProductVersion FileVersion FileName


15.01.2375.028 15.01.2375.028 D:\Program Files\Microsoft\Exchange Server\V15\bin\ExSetup.exe

Kindly suggest any patch to get clean completely above malware.

Thanks,
Sachin Shinde

Windows development | Internet Information Services
Exchange | Exchange Server | Management
{count} votes

3 answers

Sort by: Most helpful
  1. Sachin Shinde 1 Reputation point
    2022-06-07T06:16:15.037+00:00

    Hi,

    We have Sophos Central & Sophos Endpoint antivirus installed. Sophos is detecting said malware & cleaning it. We run Microsoft Safety scanner on Exchange server, but it didn't found any virus. Also we checked vulnerability with EOMT.ps1 script and no vulnerability found. We noticed Sophos detected & cleaned same malware on 31st May 2022, 1st June 2022 & 6th June 2022 to same location. Do we require any further checking & what is behaviour of "xml/web agent-a" malware. What kind of impact it can cause.

    Thanks,
    Sachin Shinde


  2. Sachin Shinde 1 Reputation point
    2022-06-08T06:26:43.367+00:00

    Hi,

    I have monitored that first below process or event runs then sophos cleans the virus. Event ID 1126

    The Microsoft Exchange Mailbox Replication service failed to add the move history entry on the target mailbox after the move. The error was ignored.
    Mailbox move: 'DB#72a3ce69-5c2d-4978-a7ff-26be15351be2\9372c651-f4fa-4bd1-8e58-52ca68c59dd8' (\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\qvsyu.aspx (PST))
    Database:
    Error: Unable to open PST file '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\qvsyu.aspx'. Error details: Access to the path '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\qvsyu.aspx' is denied. --> Access to the path '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\qvsyu.aspx' is denied

    The Microsoft Exchange Mailbox Replication service failed to add the move history entry on the target mailbox after the move. The error was ignored.
    Mailbox move: 'DB#72a3ce69-5c2d-4978-a7ff-26be15351be2\5260b6b8-1233-411d-923f-ca6fb989c9d7' (\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\wavlr.aspx (PST))
    Database:
    Error: Unable to open PST file '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\wavlr.aspx'. Error details: Access to the path '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\wavlr.aspx' is denied. --> Access to the path '\127.0.0.1\c$\inetpub\wwwroot\aspnet_client\wavlr.aspx' is denied.

    Thanks,
    Sachin Shinde

    0 comments No comments

  3. Sachin Shinde 1 Reputation point
    2022-06-08T11:13:56.263+00:00

    Hi,
    Also Test-ProxyLogon.ps1 & EOMT.ps1 scripts didn't find any vulnerability. NetworkMonitoring folder is automatically getting created in D drive. How we can clear if Exchange server 2016 CU22 is already infected.
    This server we installed 2 weeks before only. Old exchange server with Exchange Server 2016 CU19 was spoofing mails, so we upgrade CU20 to CU22 to same server but still spoofing was happening. So 2 weeks before we install new hardware & migrate all users to new server. Is there any chances after hardware migration old malware impacts new hardware also. And what is behaviour of "xml/web agent-a" malware.

    Thanks,
    Sachin Shinde


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.